Security, what is it? well, it is our way of keeping safe against harm.

Security can be against external or internal threats. There are companies that have very secret information, that should stay internally without getting public and leaking outside, so they take measures to keep the information internal and prevent it from leaking outside by following certain security protocols. The same idea is being taken in order to prevent external access to that delicate secret information.

The main issue with security is that many resources need to be shared, some need external access to reach the internet or another resource of information on external servers. Since there are programs running on both sides, which gain different access privileges, there is always the risk of exposure. The security technologies need to close all of those risks, by minimizing 

accessibility, using secured protocols and exposing only the data that we have to expose, so we will reduce risk to a minimum.

The best way to secure everything is to only work locally and of course in a very secured facility that no one is allowed to exit or enter the facility 🙂 ha ha ha – that sounds far fetched, so if there are people there, they will not see daylight until they die. Since this is a nice thought but not really doable, we have to understand that we need to take some risk in order to function properly, and sharing info is part of using computers, so there is some risk involved.

The fact that there is some risk to it all, means we need to secure those risks and try and reduce to minimize the exposure risk. That is why we have security technologies, to help us achieve that goal.

Now, I will try and go over some of the security technologies that are being used and available today, as far as I could find. There are many different types of security techniques and technologies which are being used, and I will probably won’t be able to cover them all, but I am sure you will get some idea of what is out there and what we can use. I am not giving the actual solutions, only the techniques we can use today and there are tools that can be used to perform those techniques.

Securing the network:

We have technologies that enable to secure our network by using these techniques:

  1. Monitor and identify secured login– making sure only authorized access is granted.
  2. Penetration testing – always perform penetration scenarios, to make sure all aspects are covered and we are still protected. This also assists in discovering holes, a breach or changes in regular mechanisms (like if a hacker has changed something, like some code in one of the systems that enable him access or pull out info).
  3. There are tools that give you managed and controlled supervised solution on what goes where and what comes in, mostly based on a web monitoring system that can be securely accessed from anywhere, or if we choose only internally. Those mechanisms can identify changes and close them to tighten security.
  4. Anti-virus tools can keep threats quarantined or eliminated, so they won’t be used by those who sent them to gain information on our system or harm our system.
  5. There are many different firewalls that can guard our WAN/LAN networks from harm. Those firewalls maintain the traffic we allow or disallow between branches, or on internet access. They are the WALL that keeps us safe and they are getting more sophisticated and more secured which makes them harder to breach.
  6. There are intrusion detection and prevention tools which provide comprehensive safety against threats that might arise.
  7. There are security tools that supervise downloads and application installations. This prevents people from downloading harmful and unauthorized software and installing them on our system.
  8. E-mails are a real big threat if it is unsupervised. There is much spam out there that reaches our mail server, and different e-mails that contain threats. There are security technologies that enable mail supervision and control over harmful e-mails, to either be tagged, quarantined, or destroyed depends on the definitions defined and security policies.
  9. There are tools that check and manage vulnerability by using the software as a service (SAAS) approach.
  10. Encryption technologies are out there using higher cipher bits, which can lock files and folders, which can guard/block the network secured protocols etc…
  11. There are safeguarding tools, that protect boots and secured hard-disks using state of the art encryption using innovative technologies.
  12. There are technologies based on intrusion prevention solutions (IPS), which uses snort detection engines that defend corporate networks from continuous attacks, during and after the attacks.
  13. The security technology consists of both Software and Hardware solutions. There are many different types of security appliances.

I believe this covers much of what security enables today and you can find some further information within these website links.

http://www.cstl.com/Solutions/Network-Security.asp
http://csrc.nist.gov/
http://www.microsoft.com/security/default.aspx
http://www.amazon.com/Fundamentals-Computer-Security-Technology-Amoroso/dp/0131089293
http://www.peterindia.net/ITSecurity.html
http://www.itsecurity.com/
http://www.cstl.com/CST/
http://en.wikipedia.org/wiki/Information_security